Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
H Listings:  Result Page 1

Hackers Open Malware Backdoor in Apache Webservers by

July 17, 2013 - A new threat is targeting Apache webservers, which are among the most widely used webservers in the world. Read this expert E-Guide to discover how to fight back against these hackers and secure your webserver.


Hackers, Hacking, and CEHv8 by  Global Knowledge

January 21, 2014 - This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.


HawkEye G-The Active Defense Grid by  Hexis Cyber Solutions Inc

May 27, 2014 - This informative whitepaper takes a look at a unique security tool designed to prevent advanced persistent threats.


Healthcare Privacy 2011: Top 5 Messaging and Collaboration Risks by  Proofpoint, Inc.

October 13, 2011 - For all healthcare providers, properly secured email and other web 2.0 tools help lower costs while improving service delivery. But failing to protect patient data or meet regulatory requirements could mean large fines and strict penalties. Watch this webcast to uncover the top 5 messaging and collaboration risks.


Heuristic Analysis- Detecting Unknown Viruses by  ESET

February 03, 2010 - The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.


Hidden Lynx – Professional Hackers for Hire by  Symantec Corporation

February 17, 2014 - This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.


Hidden Lynx: Professional Hackers for Hire by  Symantec Corporation

September 17, 2013 - In this white paper, uncover the facts behind security's most threatening presence, the Hidden Lynx group, which uses more sophisticated, targeted attacks, and has the ability to adapt to defense methods.


High Availability Solutions in Exchange Server 2007 That Eliminate the Need for Disaster Recovery by  Marathon Technologies

February 15, 2010 - In this transcript featuring Exchange expert Peter Bruzzese, learn how to utilize tools for high availability (HA) that can eliminate the need for disaster recovery in Exchange Server 2007 environments. Find out how to ensure optimal uptime, availability and recovery in your Exchange environment.


High-performance protection at the network edge—what, why and how by  Sophos, Inc.

November 05, 2009 - With more demands being put on lightweight network-edge hardware to provide security and connectivity, combining simplified malware detection with URI filtering can offer excellent proactive protection without overburdening the hardware or the administrator.


Hit Malware Hard: Your Weapon: CounterSpy Enterprise by  Sunbelt Software

September 01, 2007 - Learn how to protect your organization against today's increasingly complex malware threats. This white paper overviews a software solution that provides malware detection, remediation, and real-time protection for today's evolving ...


Hitachi NAS Platform 3080 and 3090 Storage Consolidation and Intelligent Tiering for Microsoft Exchange Environments by  Hitachi Data Systems

September 01, 2009 - Exchange Unified Messaging brings different mission critical systems together, effectively consolidating infrastructure while improving productivity for users, but at the cost of increasing the load on the Exchange environment in terms of management, storage and importance to the business.


HKMP Case Study: BlackBerry Solution is on the Money for Accounting Firm by  BlackBerry

September 16, 2011 - Access this case study to learn how an accounting firm used BlackBerry® smartphones to meet their needs for almost immediate communications, collaboration, document access and security.


Home Suite Home by  Avaya

September 01, 2011 - This videocast exemplifies a unified communications system that enables companies to experience real-time business communications solutions that allow them to collaborate in any mode they want—voice, video, email, or IM—on virtually any device they want.


Hosted Security IT Manager's Guide by  Symantec Hosted Services

July 01, 2009 - Hosted security, such as MessageLabs, provides companies with protection against email and web malware plus spam and content filtering, email archive and continuity. Read this guide to learn more about your hosted security options.


How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware by  Infoblox

April 24, 2013 - Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.


How Are DDoS Attacks Evolving? by  Neustar®

May 05, 2014 - This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.


How can Cisco cloud security accelerate cloud adoption? by  Cisco Systems, Inc.

October 17, 2012 - Cloud computing is quickly becoming a popular solution for customers. Consult this study to learn more about why security is one of the top barriers in regards to cloud computing. Uncover some of the risks and concerns you can face by implementing cloud computing in your enterprise.


How Cisco IT Deployed Enterprise Messaging on Cisco UCS by  Insight

April 24, 2013 - Access this case study to examine how one organization leveraged consolidation in their Exchange environment to optimally support the latest Exchange upgrade. Learn more about the results realized, lessons learned and next steps towards effective Exchange operations.


How Cloud-Based Mobile Device Security Streamlines Data Protection by

March 13, 2013 - Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.


How Consumerization Affects Security and Compliance by

February 29, 2012 - The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.


How Do You Score? Silverpop's Benchmark Study of B2B Lead Management Practices by  Vtrenz, Inc

August 01, 2008 - Listen to this webinar and learn how to grab a peek at your competitors marketing results. It also discusses lead growth, form completion rate, email performance metrics, channels, and best practices.


How Flash Storage Impacts Us Every Second by  IBM

June 09, 2013 - This quick video describes how flash storage is changing the game and impacting users and organizations every second of every day. View now to learn more about one vendor's platform that offers 1 petabye per rack for 22 million IOPS, 38% lower licensing costs, and much more.


How Malware Can Sneak Into Your Company Networks and How to Deal With It by  AVG Technologies USA, Inc.

March 31, 2010 - Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.


How Mobile Devices are Driving Innovations in Contact Centers by  Avaya

October 29, 2012 - Failing to adopt a customer service strategy for mobile devices could put your business at a serious disadvantage. Gartner research suggests that 80% of companies will suffer revenue loss from the lack of customer support on mobile devices by 2013. Read this paper to learn how to utilize the opportunities mobility offers customer service.


How Social Business Pays Off by  Jive Software

December 31, 2013 - Social collaboration technology is a hot topic in the business applications space today -- but what about the hard numbers? Many companies are wary and want concrete proof of ROI and payback. Fortunately, this informative resource offers just that.


How social media drives business success by

May 21, 2012 - There is a growing recognition that rather than being a distraction or a time drain, social tools could hold the key to a more productive way of doing business, this report from Google argues.


How to Achieve 100% Electronic AR Invoicing Realistic Steps to Quit Paper by  Esker Inc.

November 24, 2009 - This paper illustrates that solutions exist today with a proven track record of success in helping companies make the transition to 100% electronic AR invoicing while satisfying their customers' needs.


How to Achieve Device Control Peace of Mind by  Lumension

July 31, 2013 - Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.


How to Address Your Top Tech Problems by  AT&T Corp

August 04, 2010 - For companies without full-time IT staff, affordable tech support is especially important. Subscription services like AT&T Tech Support 360SM can be a great solution for wireless network configuration, e-mail, office application and computer performance problems, mobile device setup, virus removal and other troublesome support issues.


How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities? by  i-Sprint Innovations

May 29, 2014 - This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities.


How to Avoid Targeted Web and Email Attacks by  M86 Security

July 19, 2011 - This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack.


How to be influential online by

November 30, 2012 - Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.


How to Build a Massively Scalable Next-Generation Firewall by  Dell Software

August 23, 2013 - Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.


How to develop cloud applications based on Web app security lessons by  Hewlett-Packard Company

April 25, 2013 - Read this expert guide to get a walk-through on developing secure applications for the cloud, and what controls need to put in place once cloud-based applications are deployed. Find out more about secure development platforms, input filtering, authentication and more.


How to Integrate UC with Mobile Device Management by

August 29, 2012 - This E-Guide from offers best practices for managing mobile unified communications (UC) in a bring your own device (BYOD) environment. Read now for tips and hints to integrating mobile device management (MDM) with your UC systems and features.


How to Migrate from Microsoft Exchange 2000/2003 to Exchange Server by  Sun Microsystems, Inc. and Microsoft

September 07, 2007 - Making the move from Microsoft Exchange 2000/2003 Server to Microsoft Exchange Server 2007 is a relatively straight process. <p/> This guide documents the process for a typical migration to Microsoft Exchange Server 2007 along with a few critical considerations before the deployment takes place.


How to prevent phishing attacks: User awareness and training by

October 26, 2011 - This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.


How to Properly Secure Your Organization: Evolving Your Threat-Detection Techniques and Endpoint Security Strategy by  Bit9, Inc.

October 23, 2013 - Learn the steps of evolving your endpoint security strategy as well as the benefits and challenges that can arise when utilizing threat detection products.


How to Steal 60 Million Dollars in 60 Seconds by  Hewlett-Packard Limited

December 16, 2013 - This webcast outlines key tactics used by cybercriminals to subvert your system and steal your hard-earned money.


How to tackle internet filtering and reporting by

November 10, 2010 - In an environment where access to a secure computing device is governed and controlled by inherently secure protocols, the problem still remains of how access to untrusted environments such as the Web is controlled.


How to Tune Oracle Instance Recovery by  Dell Software

May 30, 2014 - Access this expert e-guide to learn more about the best practices for tuning Oracle instance recovery.


How to use Email, SMS, MMS, and PIN Messaging by  BlackBerry

June 11, 2010 - This video, presented by Tariq Tahir, covers how to integrate BlackBerry Java applications with various BlackBerry messaging systems. Topics include email application, PIN messaing, SMS messaging, MMS messaging, and more.


How Top Retailers Use Transactional Email: Silverpop Study Reveals Revenue-Boosting Tactics by  Silverpop Systems Inc.

January 01, 2006 - Transactional emails are those which companies send to customers to confirm a purchase, notify shipping dates, deliver warranty information and it also provide marketers a rich opportunity to develop strong customer relationships.


How traditional firewalls fail by  Dell Software

December 20, 2012 - Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.


HP E5000 Messaging System for Microsoft Exchange Server 2010 by  HP and Microsoft

April 25, 2011 - Email, voicemail, instant messaging, social networking, messages, faxes, shared calendars, and centralized contacts are all essential for boosting productivity and collaboration. Email has evolved from more than just text. Many would find the situation daunting, but smart organizations know the solution. Read this white paper to learn more.


HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems by  Hewlett-Packard Limited

November 01, 2013 - Prevent future cyber attacks from occurring by modifying your company's security infrastructure.


Hyper-Mobility meets Security in the corporate environment by  Kaspersky Lab

November 04, 2011 - The use of mobile devices in the enterprise is on the rise as it enables employees to be more productive. But this new trend does not come without risk. View this paper now to explore the key threats of mobile device usage and discover how to ensure complete protection with Kaspersky Endpoint Security for Smartphone.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts